MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a3314185c4c7b813105231aa59fbf2045b1fa595fd4bf322370112926afc24a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | a3314185c4c7b813105231aa59fbf2045b1fa595fd4bf322370112926afc24a7 |
|---|---|
| SHA3-384 hash: | 37717a3b15ea1eef42e4346175ba6656128833d8a83fdacb21b13c21b48b0612a906d8242677ad1c01b130a031f3cf70 |
| SHA1 hash: | b455f535495fbdb03b6b34c331bed5a2cee7171d |
| MD5 hash: | 7aced7e1b8e9908c16a154758b671f78 |
| humanhash: | zebra-mississippi-beer-oklahoma |
| File name: | INV20200531RFQ6748.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 110'592 bytes |
| First seen: | 2020-06-02 16:01:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e6a59265a67f17a8bb6e5f161c02ce7d (1 x GuLoader) |
| ssdeep | 1536:POSPfxV40pbpz39kgrKHxLdGKc+o0FDHdZ1gIygE8Xkf9m:PnPXL3lKVdhjFD9zn |
| Threatray | 1'479 similar samples on MalwareBazaar |
| TLSH | DFB38D03ED4D8653D0844BBD2C679E793B0DB90D0D445BDF76B56E9BAD312022CAB21E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail1.bm-cheap.site
Sending IP: 62.173.139.179
From: "Jennifer R. Lingad" <jlingad@dorniertechnology.com>
Subject: Re:request for PO
Attachment: INV20200531RFQ6748.gz (contains "INV20200531RFQ6748.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1WAGoGMIRBqecNTPBOW4srU7WAVClT1Wp
Intelligence
File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-06-02 16:36:03 UTC
AV detection:
18 of 31 (58.06%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 1'469 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.